Tagged: cyber threats

A cyber security manager identifying an inside attack in a corporate network.

Mitigating Insider Threats Within U.S. Critical Infrastructure

The National Counterintelligence and Security Center of the Office of the Director of National Intelligence has released Insider Threat Mitigation for U.S. Critical Infrastructure Entities: Guidelines from an Intelligence Perspective. This document highlights the importance of mitigating insider threats within U.S. critical infrastructure entities to meet the expanding nature of threats...

Typewriter with paper coming out of the top with Fake News typewritten on it

A Different Kind of Infektion

Graphika‘s latest report, Secondary Infektion, is named after a sophisticated Russian disinformation operation that specializes in drumming up discord between Russia and their perceived enemies and critics. The organization’s negative effects span dozens of countries, in seven different languages, and across more than 300 web-based platforms. While the ramifications are many,...

computer hardware

Tracking State-Sponsored Cyber Operations

The Council on Foreign Relations is at the forefront of collecting the most important data on state-sponsored cyber activity around the world. Under the guidance of the Digital and Cyberspace Policy program the resulting platform paints a very dynamic world of cyber activity with new actors emerging every year. Launched in 2017,...

arid earth with a dried out tree

Global Risks Report 2019 is Released

The World Economic Forum’s Global Risks Advisory Board has released its annual overview of most pressing risks facing the world in 2019. The Global Risks Report 2019 looks at the contemporary challenges along with their potential levels of impact – “from slowing global growth and persistent inequality to climate change, geopolitical...

Mouse pointing to typed Security

Financially Motivated Cyber Threats: A New Suspect is Identified

FireEye, Inc., an independent intelligence-led security company, has published an investigative report highlighting recent activities of the North Korean state-sponsored cyber operations. Based on the intensive review of various offensive actors in the cyber domain, the report identifies a distinct, financially-motivated group, APT38. While APT38 appears to share certain developmental...